Viral shaming or (shaming, online shaming, public shaming) is a form of cyberbullying involving the public exposure and ridicule of individuals through widespread sharing in social media, typically for behavior which is seen as deviant.
Advances in technological communication have dramatically changed the ways in which social norm enforcement is used to constrain behavior. Viral shaming involves the intentional collection and dissemination of data that are potentially stigmatizing in modes that are widely accessible and in which observers (including members of the public) can often add input.
Shaming has ancient roots, with accounts in the revered writings and holy books of many societies and religions, including those of Charles Dickens and Seneca.
A common feature of online shaming is public humiliation. A challenge is to differentiate between a humbling (rightly knocking someone down a peg for a social transgression) and a humiliation that is an affront to dignity (wrongly knocking someone down a peg). In addition, the privacy concern of shamed individuals is not necessarily about intrusion on seclusion or revelation of embarrassing information, but rather about the disruption in their ability to continue to participate in online spaces free from attack.
In recent years, viral online shaming has cost companies millions, candidates elections, and individuals their careers overnight.
Viral shaming
A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.
The Most Popular Posts
-
The trash can has been a familiar presence on computer desktops starting with the early Macintosh systems. Unwanted files can be moved t...
-
Computer pharming is a sophisticated cyberattack designed to deceive users by redirecting them from legitimate websites to fraudulent ones w...
-
In today’s highly competitive global marketplace, small business owners need every edge they can get to stay afloat and thrive. One of the m...
-
The ARPANET, or Advanced Research Projects Agency Network, played a pivotal role in the history of the internet. Initiated in 1969 by the U....
-
The business of many companies and organizations nowadays is essentially based on software. Software tasks range from controlling nuclear ...
-
-
The *Auspicious Incident* (*Vaka-i Hayriye*) refers to the dramatic destruction of the Ottoman Janissary corps by Sultan Mahmud II on June 15, 1826. Thou...